First published: Thu Jan 11 2007(Updated: )
F5 FirePass 5.4 through 5.5.2 and 6.0 allows remote attackers to access restricted URLs via (1) a trailing null byte, (2) multiple leading slashes, (3) Unicode encoding, (4) URL-encoded directory traversal or same-directory characters, or (5) upper case letters in the domain name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F5 FirePass SSL VPN | =5.4 | |
F5 FirePass SSL VPN | =5.4.1 | |
F5 FirePass SSL VPN | =5.4.2 | |
F5 FirePass SSL VPN | =5.4.3 | |
F5 FirePass SSL VPN | =5.4.4 | |
F5 FirePass SSL VPN | =5.4.5 | |
F5 FirePass SSL VPN | =5.4.6 | |
F5 FirePass SSL VPN | =5.4.7 | |
F5 FirePass SSL VPN | =5.4.8 | |
F5 FirePass SSL VPN | =5.4.9 | |
F5 FirePass SSL VPN | =5.5 | |
F5 FirePass SSL VPN | =5.5.1 | |
F5 FirePass SSL VPN | =5.5.2 | |
F5 FirePass SSL VPN | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0187 is classified as a critical vulnerability due to its potential to allow remote attackers access to restricted URLs.
To mitigate CVE-2007-0187, ensure that you upgrade F5 FirePass to version 6.0 or later, or apply any available patches.
CVE-2007-0187 affects F5 FirePass versions 5.4 through 5.5.2 and also version 6.0.
CVE-2007-0187 allows remote attackers to exploit multiple techniques including trailing null bytes and directory traversal to access restricted URLs.
Yes, updating your F5 FirePass software to a secure version will protect against the vulnerabilities identified in CVE-2007-0187.